{"id":10501,"date":"2019-12-25T18:00:37","date_gmt":"2019-12-25T18:00:37","guid":{"rendered":"http:\/\/blog.bachi.net\/?p=10501"},"modified":"2020-04-19T08:02:02","modified_gmt":"2020-04-19T08:02:02","slug":"computerphile","status":"publish","type":"post","link":"https:\/\/blog.bachi.net\/?p=10501","title":{"rendered":"Computerphile"},"content":{"rendered":"<p><a href=\"https:\/\/www.youtube.com\/watch?v=1S0aBV-Waeo\">Buffer Overflow Attack &#8211; Computerphile<\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=ciNHn38EyRc\">Running an SQL Injection Attack &#8211; Computerphile<\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=XiFkyR35v2Y\">Slow Loris Attack &#8211; Computerphile<\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=L5l9lSnNMxg\">Cracking Websites with Cross Site Scripting &#8211; Computerphile<\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=ZXFYT-BG2So\">2FA: Two Factor Authentication &#8211; Computerphile<\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=-5wpm-gesOY\">The Problem with Time &#038; Timezones &#8211; Computerphile<\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=6RNKtwAGvqc\">The Golden Key: FBI vs Apple iPhone &#8211; Computerphile<\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=vhiiia1_hC4\">Computers Without Memory &#8211; Computerphile<\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=nybVFJVXbww\">Elliptic Curve Back Door &#8211; Computerphile<\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=NF1pwjL9-DE\">Elliptic Curves &#8211; Computerphile<\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=MijmeoH9LT4\">Characters, Symbols and the Unicode Miracle &#8211; Computerphile<\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=Kalmryn9_sE\">Game Physics (in Assembler) &#8211; Computerphile<\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=tDVPcqGpEnM\">Apache Spark &#8211; Computerphile<\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=cvhKoniK5Uo\">MapReduce &#8211; Computerphile<\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=7U-RbOKanYs\">Password Cracking &#8211; Computerphile<\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=rop0W4QDOUI\">Maze Solving &#8211; Computerphile<\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=GazC3A4OQTE\">Dijkstra&#8217;s Algorithm &#8211; Computerphile<\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=de2Hsvxaf8M\">&#8220;C&#8221; Programming Language: Brian Kernighan &#8211; Computerphile<\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=ci1PJexnfNE\">Why C is so Influential &#8211; Computerphile<\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=NTfOnGZUZDk\">Where GREP Came From &#8211; Computerphile<\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=b4b8ktEV4Bg\">Hashing Algorithms and Security &#8211; Computerphile<\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=DMtFhACPnTY\">SHA: Secure Hashing Algorithm &#8211; Computerphile<\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=TWEXCYQKyDc\">Secrets Hidden in Images (Steganography) &#8211; Computerphile<\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=48tFB_sjHgY\">PDF, What is it FOR? &#8211; Computerphile<\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=ORcvSkgdA58\">How Secure Shell Works (SSH) &#8211; Computerphile<\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=QRYzre4bf7I\">Onion Routing &#8211; Computerphile<\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=sqV3pL5x8PI\">Programming Paradigms &#8211; Computerphile<\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=-csXdj4WVwA\">Where HTML beats C? &#8211; Computerphile<\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=pcJHkWwjNl4\">Sorting Secret &#8211; Computerphile<\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=l42lr8AlrHk\">Deep Learning &#8211; Computerphile<\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=TJlAxW-2nmI\">Deep Learning &#8211; Computerphile<\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=mwTaISbA87A\">How Face ID Works&#8230; Probably &#8211; Computerphile&#8221;><\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=t1e8gqXLbsU\">What is a Monad? &#8211; Computerphile<\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=LnX3B9oaKzw\">Functional Programming &#038; Haskell &#8211; Computerphile<\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=poY_nGzEEWM\">Bicubic Interpolation &#8211; Computerphile<\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=ySN5Wnu88nE\">A* (A Star) Search Algorithm &#8211; Computerphile<\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=YOxDb_BbXzU\">What if the Universe is a Computer Simulation? &#8211; Computerphile<\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=vNG3ZAd8wCc\">Video Game &#038; Complex Bokeh Blurs &#8211; Computerphile<\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=wlSG3pEiQdc\">Securing Stream Ciphers (HMAC) &#8211; Computerphile<\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=qW361k3-BtU\">Taming Kerberos &#8211; Computerphile<\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=AAssk2N_oPk\">TCP Meltdown &#8211; Computerphile<\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=goOa3DGezUA\">Elegant Compression in Text (The LZ 77 Method) &#8211; Computerphile<\/a><\/p>\n<h3>Alex<\/h3>\n<p><a href=\"https:\/\/www.youtube.com\/watch?v=kgBjXUE_Nwc\">Getting Sorted &#038; Big O Notation &#8211; Computerphile<\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=XE4VP_8Y0BU\">Quick Sort &#8211; Computerphile<\/a><\/p>\n<h3>Thorsten<\/h3>\n<p><a href=\"https:\/\/www.youtube.com\/watch?v=8lhxIOAfDss\">Recursion &#8216;Super Power&#8217; (in Python) &#8211; Computerphile<\/a><br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=r__GZ7ubU0M\">Halting Problem in Python &#8211; Computerphile<\/a><\/p>\n<h3>Playlist<\/h3>\n<p><a href=\"https:\/\/www.youtube.com\/playlist?list=PLzH6n4zXuckpoaxDKOOV26yhgoY2S-xYg\">Cryptographic Key Exchange<\/a><\/p>\n<ul>\n<li>Secret Key Exchange (Diffie-Hellman)<\/li>\n<li>Diffie Hellman -the Mathematics bit<\/li>\n<li>Key Exchange Problems<\/li>\n<li>Elliptic Curves<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.youtube.com\/playlist?list=PLzH6n4zXuckoezZuZPnXXbvN-9jMFV0qh\">Neural Networks<\/a><\/p>\n<ul>\n<li>Neural Network that Changes Everything<\/li>\n<li>Inside a Neural Network<\/li>\n<li>Deep Dream (Google)<\/li>\n<li>Deep Learning <\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Buffer Overflow Attack &#8211; Computerphile Running an SQL Injection Attack &#8211; Computerphile Slow Loris Attack &#8211; Computerphile Cracking Websites with Cross Site Scripting &#8211; Computerphile 2FA: Two Factor Authentication &#8211; Computerphile The Problem with Time &#038; Timezones &#8211; Computerphile The Golden Key: FBI vs Apple iPhone &#8211; Computerphile Computers Without Memory &#8211; Computerphile Elliptic Curve [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-10501","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/blog.bachi.net\/index.php?rest_route=\/wp\/v2\/posts\/10501","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.bachi.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.bachi.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.bachi.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.bachi.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=10501"}],"version-history":[{"count":17,"href":"https:\/\/blog.bachi.net\/index.php?rest_route=\/wp\/v2\/posts\/10501\/revisions"}],"predecessor-version":[{"id":10929,"href":"https:\/\/blog.bachi.net\/index.php?rest_route=\/wp\/v2\/posts\/10501\/revisions\/10929"}],"wp:attachment":[{"href":"https:\/\/blog.bachi.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=10501"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.bachi.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=10501"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.bachi.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=10501"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}